14 Sep 2020
We cover cryptographically signed audit logging, when logs are generated in a certain way which prevents tampering messages, removing, adding or changing the order of log entries. We explain why signed logs are essential for security software, how we’ve built-in secure audit logging in Acra, and how to use it together with other defense in-depth layers in your systems.
23 Jul 2019
What is searchable encryption and what are the tools that allow performing secure search over encrypted data. A brief overview.
7 May 2019
Step-by-step installation and configuration tutorial.
16 Apr 2019
Acra encryption suite is now available as 1-Click App running in a Droplet on DigitalOcean Marketplace.
4 Apr 2019
How to protect the data in your app infrastructure using the defence in depth approach, explained on the example of Acra encryption suite.
15 Mar 2019
Introducing more flexible configuration for AcraCensor and server-side encryption mode for AcraServer. Secure search over encrypted data available for Acra Enterprise now!
13 Feb 2019
Using SQL firewall to protect database against SQL injections at scale as compared to WAF.
31 Dec 2018
Seven releases of Acra, Customer Success Program and security training services, a whole new Docserver, conference talks all over the world, and much more.
22 Nov 2018
A battle-tested explanation of why tracing is a very useful technique you can benefit from in your projects. A story from the trenches of implementing distributed tracing in our Acra data security suite.
9 Nov 2018
The release of Acra version 0.84.0 marks the new frontier for the data security suite.